// For flags

CVE-2024-39915

Authenticated remote code execution in Thruk

Severity Score

9.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Thruk is a multibackend monitoring webinterface for Naemon, Nagios, Icinga and Shinken using the Livestatus API. This authenticated RCE in Thruk allows authorized users with network access to inject arbitrary commands via the URL parameter during PDF report generation. The Thruk web application does not properly process the url parameter when generating a PDF report. An authorized attacker with access to the reporting functionality could inject arbitrary commands that would be executed when the script /script/html2pdf.sh is called. The vulnerability can be exploited by an authorized user with network access. This issue has been addressed in version 3.16. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Thruk es una interfaz web de monitoreo multibackend para Naemon, Nagios, Icinga y Shinken que utiliza la API Livestatus. Este RCE autenticado en Thruk permite a los usuarios autorizados con acceso a la red inyectar comandos arbitrarios a través del parámetro URL durante la generación de informes PDF. La aplicación web Thruk no procesa correctamente el parámetro de URL al generar un informe en PDF. Un atacante autorizado con acceso a la funcionalidad de informes podría inyectar comandos arbitrarios que se ejecutarían cuando se llame al script /script/html2pdf.sh. La vulnerabilidad puede ser explotada por un usuario autorizado con acceso a la red. Este problema se solucionó en la versión 3.16. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-07-02 CVE Reserved
  • 2024-07-15 CVE Published
  • 2024-07-16 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sni
Search vendor "Sni"
Thruk
Search vendor "Sni" for product "Thruk"
< 3.16
Search vendor "Sni" for product "Thruk" and version " < 3.16"
en
Affected